Methods, devices, and systems for detecting return-oriented programming exploits
A technology for processing devices and memory systems, applied in memory systems, error detection/correction, computer security devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In the following description, reference is made to the accompanying drawings, in which are shown by way of illustration specific examples in which the invention may be practiced. The examples are intended to describe aspects of the invention in sufficient detail to enable one skilled in the art to practice one or more of the described features. Other features may be utilized and changes may be made to the disclosed examples without departing from the scope of the invention. The following detailed description should not be taken in a limiting sense, and the scope is defined only by the appended claims.
[0026]The term "data" is used interchangeably herein to refer to computing instructions usable by a processor and data manipulable by the processor. The context in which the term "data" is used should be such that it is obvious when "data" refers to instructions. Instructions may be specifically referred to as instructions or instruction data, where appropriate.
[00...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com